logd: drop can_read_security_logs

This has become useless after refactoring; we instead ensure that the
LOG_ID_SECURITY bit isn't set in log_mask, instead of having this
additional check.

Test: logging unit tests
Change-Id: Id47b288d056ebf2b5bd26be94006f17c24fafd31
This commit is contained in:
Tom Cherry 2020-05-28 21:03:43 -07:00
parent 855c7c87a3
commit eb49b04e21
4 changed files with 8 additions and 16 deletions

View File

@ -45,7 +45,7 @@ void FixupMessages(std::vector<LogMessage>* messages);
class TestWriter : public LogWriter {
public:
TestWriter(std::vector<LogMessage>* msgs, bool* released)
: LogWriter(0, true, true), msgs_(msgs), released_(released) {}
: LogWriter(0, true), msgs_(msgs), released_(released) {}
bool Write(const logger_entry& entry, const char* message) override {
msgs_->emplace_back(LogMessage{entry, std::string(message, entry.len), false});
return true;

View File

@ -45,11 +45,8 @@ static std::string SocketClientToName(SocketClient* client) {
class SocketLogWriter : public LogWriter {
public:
SocketLogWriter(LogReader* reader, SocketClient* client, bool privileged,
bool can_read_security_logs)
: LogWriter(client->getUid(), privileged, can_read_security_logs),
reader_(reader),
client_(client) {}
SocketLogWriter(LogReader* reader, SocketClient* client, bool privileged)
: LogWriter(client->getUid(), privileged), reader_(reader), client_(client) {}
bool Write(const logger_entry& entry, const char* msg) override {
struct iovec iovec[2];
@ -162,9 +159,11 @@ bool LogReader::onDataAvailable(SocketClient* cli) {
bool privileged = clientHasLogCredentials(cli);
bool can_read_security = CanReadSecurityLogs(cli);
if (!can_read_security) {
logMask &= ~(1 << LOG_ID_SECURITY);
}
std::unique_ptr<LogWriter> socket_log_writer(
new SocketLogWriter(this, cli, privileged, can_read_security));
std::unique_ptr<LogWriter> socket_log_writer(new SocketLogWriter(this, cli, privileged));
uint64_t sequence = 1;
// Convert realtime to sequence number

View File

@ -23,8 +23,7 @@
// An interface for writing logs to a reader.
class LogWriter {
public:
LogWriter(uid_t uid, bool privileged, bool can_read_security_logs)
: uid_(uid), privileged_(privileged), can_read_security_logs_(can_read_security_logs) {}
LogWriter(uid_t uid, bool privileged) : uid_(uid), privileged_(privileged) {}
virtual ~LogWriter() {}
virtual bool Write(const logger_entry& entry, const char* msg) = 0;
@ -35,12 +34,10 @@ class LogWriter {
uid_t uid() const { return uid_; }
bool privileged() const { return privileged_; }
bool can_read_security_logs() const { return can_read_security_logs_; }
private:
uid_t uid_;
// If this writer sees logs from all UIDs or only its own UID. See clientHasLogCredentials().
bool privileged_;
bool can_read_security_logs_; // If this writer sees security logs. See CanReadSecurityLogs().
};

View File

@ -164,10 +164,6 @@ bool SimpleLogBuffer::FlushTo(
continue;
}
if (!writer->can_read_security_logs() && element.getLogId() == LOG_ID_SECURITY) {
continue;
}
if (((1 << element.getLogId()) & state.log_mask()) == 0) {
continue;
}